@incollection{, D9672872184B10C0230B52044149C125 , note={Year 2017} , author={{SeunEbiesuwa} and {AKINSANYA,Adebola} and {AKINSANYA,Adebola} and {Babcock University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1731523 } @incollection{b0, , title={{Graphical One-Time Password (GOTPass): A usability evaluation}} , author={{ HAlsaiari } and { MPapadaki } and { PDowland } and { SFurnell }} 10.1080/19393555.2016.1179374 , journal={{Information Security Journal: A Global Perspective}} , year={2016} } @book{b1, , title={{Graphical password: Learning from the first twelve years}} , author={{ RBiddle } and { SChiasson } and { POorschot }} TR-11-01 , year={2011} , note={Technical Report} } @book{b2, , title={{Psychology--the science of behaviour}} , author={{ NRCarlson } and { DCHeth }} , year={2010} , publisher={Person} , address={Toronto} } @incollection{b3, , title={{Design and Analysis of a Graphical Password Scheme. Innovative Computing, Information and Control (ICICIC)}} , author={{ HGao } and { XLiu } and { SWang } and { RDai }} 10.1109/ICICIC.2009.158 , journal={{IEEE Xplore}} , year={2009} } @incollection{b4, , title={{Passblot: A Highly Scalable Graphical One Time Password System}} , author={{ SGupta } and { SSahni } and { PSabbu } and { SVarma } and { SVGangashetty }} , journal={{International Journal of Network Security & Its Applications (IJNSA)}} 2 4 , year={2012} } @incollection{b5, , title={{Security Evaluation for Graphical Password}} , author={{ AHLashkari } and { AAManaf } and { MMasrom } and { MSDaud }} , booktitle={{DICTAP 2011, Proceedings, Part I.166}} Dijion, France; Heidelberg Dordrecht , publisher={Springer} , year={2011} , note={International Conference} } @incollection{b6, , title={{Dual coding theory: Retrospect and current status}} , author={{ APaivio }} , journal={{Canadian Journal of Psychology}} 45 , year={1991} } @incollection{b7, , title={{Eliminating Vulnerable Attacks Using One-Time Password and PassText -Analytical Study of Blended Schema}} , author={{ MVPrakash } and { PAInfant } and { SJShobana }} , journal={{Universal Journal of Computer Science and Engineering Technology}} 1 2 , year={2010} } @incollection{b8, , title={{Perception and memory for pictures: Single-trial learning of 2500 visual stimuli}} , author={{ LStanding } and { JConezio } and { RNHaber }} 10.3758/BF03337426 , journal={{Psychonomic Science}} 19 2 , year={1970} } @book{b9, , author={{ XSuo } and { YZhu } and { SGOwen }} , title={{Graphical Passwords: A Survey}} , year={2005} } @incollection{b10, , title={{Latitude and longitude}} , booktitle={{The Editors of Encyclopedia Britannica}} , year={2012. July 3. April 5, 2017} } @book{b11, , author={{ CVarenhorst } and { VMKleek } and { LRudolph }} , title={{Passdoodles; a Lightweight Authentication Method}} , year={2004} , note={Research Science Institute} } @incollection{b12, , title={{PassPoints: design and longitudinal evaluation of a graphical password system}} , author={{ SWiedenbeck } and { JWaters } and { J.-CBirget } and { ABrodskiy } and { NMemon }} , journal={{Int. J. Hum.-Comput. Stud}} 63 , year={2005} }